
Systesign
431 subscribers
About Systesign
The first step to knowing the best approach, is knowing all the options. Discover impressive software, distributed system design, database, compilers, cache, queue articles in the industry from various sources. Keep up to date with various subjects from the cutting edge of the industry
Similar Channels
Swipe to see more
Posts

https://www.chriis.dev/opinion/parsing-pdfs-in-elixir-using-rust Calling core Rust code that plays nicely with the Elixir BEAM needs NIF (Native Implemented Functions). NIFs are the BEAM's method to directly call Native Functions such as those written in Rust, giving you the performance benefit of Rust without sacrificing the ease of use of Elixir using the rustler crate https://crates.io/crates/rustler Fly.io's blog also explores packaging rust object files within elixir projects for production docker images https://fly.io/phoenix-files/elixir-and-rust-is-a-good-mix/

https://engineering.fb.com/2025/01/21/production-engineering/strobelight-a-profiling-service-built-on-open-source-technology/ Read on how Meta built Strobelight which combines a ton of open source tools into one profiling utopia, providing engineers with much needed information such as heap dumps from services using jemalloc, flame graphs, trace visualisations, e.t.c. This helps provide much needed performance wins across their entire compute fleet including a particular case that led to saving an estimated 15,000 servers in capacity per year

https://www.usenix.org/system/files/usenixsecurity23-he.pdf eBPF is such an amazing technology with vasts applications within networking, security, tracing, e.t.c. This 2 year old paper on cross container attacks in the cloud using eBPF broaches the seldom explored aspect of eBPF itself posing huge security risks despite its verifier .... with practical exploits at the time such as executing ssh in Google Collab (despite the block) and compromising the entire Alibaba cluster ... while proposing a new eBPF permission model to mitigate against its offensive functions

https://kobzol.github.io/rust/2025/02/23/tokio-plus-prctl-equals-nasty-bug.html The author of hyperqueue (a distributed task scheduler written in Rust https://github.com/It4innovations/hyperqueue) writes about a very interesting heisenbug that only occurs using the PR_SET_PDEATHSIG flag with prctl syscall https://man7.org/linux/man-pages/man2/pr_set_pdeathsig.2const.html flag on linux systems with the tokio async runtime

https://paulbutler.org/2025/smuggling-arbitrary-data-through-an-emoji/ I got nerdsnipped reading this cutesy article about sneaking data through emojis On its own it makes for good reading into some of the quirks of the unicode spec and potential ways to abuse it (which we won't... right?)